企业风险管理:企业如何整合网络风险?

IF 3.1 Q2 MANAGEMENT Management Research Review Pub Date : 2023-05-26 DOI:10.1108/mrr-10-2021-0774
Sasha Romanosky, Elizabeth Petrun-Sayers
{"title":"企业风险管理:企业如何整合网络风险?","authors":"Sasha Romanosky, Elizabeth Petrun-Sayers","doi":"10.1108/mrr-10-2021-0774","DOIUrl":null,"url":null,"abstract":"\nPurpose\nThe purpose of this study is to examine how companies integrate cyber risk into their enterprise risk management practices. Data breaches have become commonplace, with thousands occurring each year, and some costing hundreds of millions of dollars. Consequently, cyber risk has become one of the gravest risks facing organizations, and has attracted boardroom-level attention. On the other hand, companies already manage many kinds of difficult and growing risks, and that firms lose less than 1% of annual revenues as a result of cyber incidents. Therefore, how should firms appropriately address cyber risk? Is it indeed a materially different kind of risk area, or is it simply just one more risk that can seamlessly be integrated into existing enterprise risk management (ERM) practices?\n\n\nDesign/methodology/approach\nThe authors performed thematic analysis based on semi-structured interviews, with non-probabilistic, purposive sampling, to answer two main questions. First, how do firms manage enterprise risks, generally? And second, how are they integrating cyber risk into these existing processes?\n\n\nFindings\nThe authors find that there is considerable variation in the approach and sophistication in ERM practices, such as whether they are driven more like an auditing function, or as a risk champion. The authors also find that despite the novelty of cyber risk, it can be integrated like other enterprise risks, and that cyber risk is most often seen as an operational risk (similar to workplace accidents or fraud), rather than a strategic risk, emerging from, for example, technology innovation and R&D.\n\n\nResearch limitations/implications\nThe generalization of the results is limited by the sample size and variation of firms interviewed. While the authors attempted to interview enterprise risk managers across a wide variation of firms, there were clear limitations in the scope. That being said, the authors were fortunate to be able to examine ERM and cyber risk practices across small and large, private and publicly traded companies, from a variety of business sectors.\n\n\nPractical implications\nThe authors believe these finding are important because they present evidence that while cyber risk may be new, it does not require specialized handling or processes to track it at the enterprise level. While some firms may choose to provide special accommodations or attention because of their data collection or business practices, this approach is neither necessary nor required of all firms in all situations.\n\n\nOriginality/value\nThis research is one of the only papers that, to the best of the authors’ knowledge, examines how cyber risk is integrated at an enterprise level.\n","PeriodicalId":47769,"journal":{"name":"Management Research Review","volume":" ","pages":""},"PeriodicalIF":3.1000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enterprise risk management: how do firms integrate cyber risk?\",\"authors\":\"Sasha Romanosky, Elizabeth Petrun-Sayers\",\"doi\":\"10.1108/mrr-10-2021-0774\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\nPurpose\\nThe purpose of this study is to examine how companies integrate cyber risk into their enterprise risk management practices. Data breaches have become commonplace, with thousands occurring each year, and some costing hundreds of millions of dollars. Consequently, cyber risk has become one of the gravest risks facing organizations, and has attracted boardroom-level attention. On the other hand, companies already manage many kinds of difficult and growing risks, and that firms lose less than 1% of annual revenues as a result of cyber incidents. Therefore, how should firms appropriately address cyber risk? Is it indeed a materially different kind of risk area, or is it simply just one more risk that can seamlessly be integrated into existing enterprise risk management (ERM) practices?\\n\\n\\nDesign/methodology/approach\\nThe authors performed thematic analysis based on semi-structured interviews, with non-probabilistic, purposive sampling, to answer two main questions. First, how do firms manage enterprise risks, generally? And second, how are they integrating cyber risk into these existing processes?\\n\\n\\nFindings\\nThe authors find that there is considerable variation in the approach and sophistication in ERM practices, such as whether they are driven more like an auditing function, or as a risk champion. The authors also find that despite the novelty of cyber risk, it can be integrated like other enterprise risks, and that cyber risk is most often seen as an operational risk (similar to workplace accidents or fraud), rather than a strategic risk, emerging from, for example, technology innovation and R&D.\\n\\n\\nResearch limitations/implications\\nThe generalization of the results is limited by the sample size and variation of firms interviewed. While the authors attempted to interview enterprise risk managers across a wide variation of firms, there were clear limitations in the scope. That being said, the authors were fortunate to be able to examine ERM and cyber risk practices across small and large, private and publicly traded companies, from a variety of business sectors.\\n\\n\\nPractical implications\\nThe authors believe these finding are important because they present evidence that while cyber risk may be new, it does not require specialized handling or processes to track it at the enterprise level. While some firms may choose to provide special accommodations or attention because of their data collection or business practices, this approach is neither necessary nor required of all firms in all situations.\\n\\n\\nOriginality/value\\nThis research is one of the only papers that, to the best of the authors’ knowledge, examines how cyber risk is integrated at an enterprise level.\\n\",\"PeriodicalId\":47769,\"journal\":{\"name\":\"Management Research Review\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":3.1000,\"publicationDate\":\"2023-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Management Research Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/mrr-10-2021-0774\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MANAGEMENT\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Management Research Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/mrr-10-2021-0774","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MANAGEMENT","Score":null,"Total":0}
引用次数: 0

摘要

本研究的目的是研究公司如何将网络风险整合到企业风险管理实践中。数据泄露已经司空见惯,每年发生数千起,其中一些造成数亿美元的损失。因此,网络风险已成为企业面临的最严重风险之一,并引起了董事会层面的关注。另一方面,公司已经在管理各种各样的困难和不断增长的风险,而且由于网络事件,公司的年收入损失不到1%。因此,企业应该如何恰当地应对网络风险?它确实是一个本质上不同类型的风险领域,还是仅仅是又一个可以无缝集成到现有企业风险管理(ERM)实践中的风险?设计/方法/方法作者在半结构化访谈的基础上进行了主题分析,采用非概率、有目的的抽样,以回答两个主要问题。首先,企业一般是如何管理企业风险的?其次,他们如何将网络风险整合到现有流程中?作者发现,在ERM实践的方法和复杂程度上存在相当大的差异,例如它们是更像审计功能,还是作为风险拥护者。作者还发现,尽管网络风险是新奇的,但它可以像其他企业风险一样被整合,并且网络风险通常被视为一种操作风险(类似于工作场所事故或欺诈),而不是战略风险,例如从技术创新和研发中出现。研究的局限性/意义研究结果的泛化受到样本量和受访公司变化的限制。虽然作者试图采访各种各样的公司的企业风险经理,但在范围上有明显的局限性。话虽如此,作者很幸运能够从不同的商业部门研究小型和大型、私营和上市公司的ERM和网络风险实践。实际意义作者认为这些发现很重要,因为它们提供了证据,尽管网络风险可能是新的,但它不需要专门的处理或流程来在企业层面跟踪它。虽然有些公司可能会因为他们的数据收集或商业惯例而选择提供特殊的便利或关注,但这种方法不是所有公司在所有情况下都必须采取的,也不是所有公司都需要采取的。原创性/价值据作者所知,本研究是为数不多的研究如何在企业层面整合网络风险的论文之一。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enterprise risk management: how do firms integrate cyber risk?
Purpose The purpose of this study is to examine how companies integrate cyber risk into their enterprise risk management practices. Data breaches have become commonplace, with thousands occurring each year, and some costing hundreds of millions of dollars. Consequently, cyber risk has become one of the gravest risks facing organizations, and has attracted boardroom-level attention. On the other hand, companies already manage many kinds of difficult and growing risks, and that firms lose less than 1% of annual revenues as a result of cyber incidents. Therefore, how should firms appropriately address cyber risk? Is it indeed a materially different kind of risk area, or is it simply just one more risk that can seamlessly be integrated into existing enterprise risk management (ERM) practices? Design/methodology/approach The authors performed thematic analysis based on semi-structured interviews, with non-probabilistic, purposive sampling, to answer two main questions. First, how do firms manage enterprise risks, generally? And second, how are they integrating cyber risk into these existing processes? Findings The authors find that there is considerable variation in the approach and sophistication in ERM practices, such as whether they are driven more like an auditing function, or as a risk champion. The authors also find that despite the novelty of cyber risk, it can be integrated like other enterprise risks, and that cyber risk is most often seen as an operational risk (similar to workplace accidents or fraud), rather than a strategic risk, emerging from, for example, technology innovation and R&D. Research limitations/implications The generalization of the results is limited by the sample size and variation of firms interviewed. While the authors attempted to interview enterprise risk managers across a wide variation of firms, there were clear limitations in the scope. That being said, the authors were fortunate to be able to examine ERM and cyber risk practices across small and large, private and publicly traded companies, from a variety of business sectors. Practical implications The authors believe these finding are important because they present evidence that while cyber risk may be new, it does not require specialized handling or processes to track it at the enterprise level. While some firms may choose to provide special accommodations or attention because of their data collection or business practices, this approach is neither necessary nor required of all firms in all situations. Originality/value This research is one of the only papers that, to the best of the authors’ knowledge, examines how cyber risk is integrated at an enterprise level.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
6.00
自引率
7.70%
发文量
71
期刊介绍: Management Research Review publishes a wide variety of articles outlining the latest management research. We emphasize management implication from multiple disciplines. We welcome high quality empirical and theoretical studies, literature reviews, and articles with important tactical implications. Published 12 times a year, the journal prides itself on quick publication of the very latest research in general management. The key issues featured include: Business Ethics and Sustainability Corporate Finance Entrepreneurship and Small Business Management Industrial Relations Information and Knowledge Management International Business Human Resource Management Organizational Theory and Behaviour Production and Operations Management Strategic Management and Leadership
期刊最新文献
Unlocking the relationship between authentic leadership and organizational citizenship behavior: the key roles of organizational support and identification Fostering employee autonomy through rewards: a self-determination theory perspective The cascading role of leader-induced defensive cognitions and citizenship pressures in navigating employee silence Bankruptcy as a planned business strategy? Evidence from the stock market Agility in virtual environments: the socio-technical approach of distributed agile teams
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1